An information security model commonly applied in the development of IT security policies based on three pillars: Confidentiality, Integrity and Availability. Confidentiality is ensured when data is protected from an unauthorised access. Integrity is about safeguarding the accuracy and completeness of transmitted information, by protecting data against any unauthorised modification. Availability means that data should be accessible to authorised users as and when required.